Комментарии:
Now are you running Vbox inside of a sandbox software like shade or sandboxie? Or is this VM running alone?
ОтветитьLMAO, my whole laptop only has 4gb of RAM.
ОтветитьYou make it interesting to learn ty
Ответитьfuck enviorment
just teach blayut
]
If on my host computer, I have a specific drive for VM's, why can I not see the Oracle program on that drive? Does Virtual Box have to be installed on the C drive of the host machine?
ОтветитьMicrosoft VM is not available anymore on their site please do an update.
ОтветитьDoes VMware work?
ОтветитьThank you so much you really help me :)
Ответитьwas monetized, so that company could aim for Nice tutorials channel to make money
Ответитьwouldn't internal network be a better choice? why would you want to give malware a path to your host machine?
ОтветитьWIthout VmWare tools installed, we can used th clipboard, so we can copy for exemple a hash from the VM to the host browser to anlalyse it ?
Ответитьare these things also enough for old malware like Bonzibuddy, MEMZ (ok, not so old), Wannacry etc.?
Ответитьare you sure about host only? because i saw tutorials saying that was the wrong thing. what is the right network adapter for just testing viruses?
Ответитьdo i get virus on my pc if i play crack game on sandbox environment ?
ОтветитьGreat video to start with , for malware analysis sandboxed environment - Thanks for sharing .
ОтветитьHello, Why we need to remove the guest ?
Ответитьwhy wouldn't the malware look to see if it can get to someplace like Google or look for fake net?
ОтветитьThanks for the amazing help of this video. I am going to start making yt videos and flashback express seems like the right option to go with. Thx again for the help this video had for me Any One Interested in the Full Version...
ОтветитьI know this is old but, fingers crossed for when they decide anything under 8 cores is a vm lol
ОтветитьThe way you used your words in this video was intelligent, precise, and clear. You are amazing at what you do. Thank you so much!
ОтветитьIs their a video for VMware / writeup
ОтветитьIs it too bad to run it in a NAT network at all times? It will receive a different IP address from the host, but this way I can create a internal networks of VMs and play with attack/defense between Windows/Kali, for example.
ОтветитьWhere's the VMWARE video?
ОтветитьWhy not use windows sandbox for malware analysis?
ОтветитьDose this still work
ОтветитьThanks for the video. Very educational and systematic, and best of all, your voice is awesome =)
ОтветитьHi! Great video, thank you very much. I was wondering, if I remove Guest Additions, I'm unable to increase the screen size e.g. go full screen, of the VM easily (there are some "low level" configurations that could be tried, but I haven't tried them yet). Note: I am using an Intel processor, so I can't select Enable Nested VT-x/AMD-V, which was one of the suggested solution I came across. Some have mentioned that it's okay to have the Guest Additions installed but to ensure that shared folders and clipboard are disabled. Any thoughts and/or suggestions regarding this, or possibly share how you dealt with this matter? Thanks!
ОтветитьSuper interesting, thank you!
Could you please also make a video about the Cuckoo sandbox for malware analysis?
do i keep fakenet running while I'm analyzing it?
Ответитьi did everything and i cant even access the shared folder bullshit because its not connected to the internet
ОтветитьThanks for the detailed tutorial you got a sub from me
ОтветитьGreat!
Ответитьinteresting. I was trying to run kali linux but my actual AV went off when i ran nikto on it (through a VM) . Is there anyway i can avoid that
ОтветитьDoes this work for testing minecraft clients that might have trojans etc?
Ответитьthorough and awesome
ОтветитьI like the speaker's voice! Very clear, confident and well spoken! Good content!
ОтветитьSo with this, what is the point of the previous windows 7 setup video?
Ответитьmy college won't provide any software that we need to study. so I want to create a 'sandbox' inside my personal laptop to install Microsoft Office 2016 products (pirated versions) in order to create my reports and homework. so... is this method works for me? cause I do not do any analysis on it. thx
ОтветитьHi, is this method safe for messing with memz or wanna cry? Cuz I wanna make a malware testing and how to deal with malware channel. So is this method completely safe for testing memz and other aggressive viruses? Thanks...
ОтветитьWould it also be advisable to choosing the amount for ram based on the "powers of 2" numbers, like for example: 4096 Mb (which is 2^12) or 8192 Mb (2^13), etc?
ОтветитьSir please upload on yourself how you started your career as ethical hacker
Ответитьlets be honest... we all just want to be able to click on every shady link that ever pops up with no consequences
Ответитьscp096 jasonmraz criticalrole 3dprinting rekietalaw carpenters markrober
ОтветитьThis is really a great tutorial. I recently made a bad decision to use software that was part of a class on Udemy and the instructor for the class said it was going to activate a "false positive" but I ran the software, it tripped my anti-virus software and then I removed the software. I don't know what the software installed though in the background or in hidden files. Would you be open to letting me pay you to analyze this software on a virtual machine and tell me what was likely installed into hidden files?
ОтветитьWho tried the 000.exe virus after? XD
Ответитьwhat about hyper-v? can I use that too?
ОтветитьWhen I go to the network settings and select host only adapter, nothing appears in the name. Please help me.
Ответить